Suspicious services used by LE to intercept data (Cloudfare, Gandi, OVH, Hetzner ... etc)

Services like OVH, Cloudflare and Gandi assisted LE to take down the Encrochat network that was used by criminals.


Source: Piped

At Jan 2019, French LE took copies of OVH’s VMs from a server at Roubaix. Then at 31 March 2020, OVH redirected traffic Encrohat’s update servers to LE.

At 29 March 2022, new certificates issued for encrochat.network using Cloudflare and pointing at Cloudflare’s IP.

This reminds me with the case of xmpp.ru / jabber.ru where Hetzner and Linode issued a compromised certificate so it can intercept messages by this xmpp’s server users. Source: Encrypted traffic interception on Hetzner and Linode targeting the largest Russian XMPP (Jabber) messaging service — , some mitigations were proposed.

Another case where RaidForums (BreachForums predecessor) DNS servers were changed to Cloudflare’s nameservers when the website was seized secretly by the LE and prompted users to a fake login page in a phishing attempt to gather threat actors’ credentials.

On February 27th, 2022, the DNS servers for raidforums.com was suddenly changed to the following servers:

jocelyn.ns.cloudflare.com
plato.ns.cloudflare.com

As these DNS servers were previously used with other sites seized by law enforcement, including weleakinfo.com and doublevpn.com, researchers believed that this added further support that the domain was seized.

Source: RaidForums hacking forum seized by police, owner arrested

At 20 March 2020, Encrochat DNS provider Gandi “redirect directly” for all Encrochat to LE. For some reason at 1 April 2020, one of Encrochat’s DNS change from dnsmadeeasy to Gandi back and forth but at the middle of the day, LE injected malware into Encrohat’s update servers collecting the following data:

They made sure Encrochat could never recover back by controlling the server and DNS and certificates making the malware persistent even after Encrochat “pushing updates to fix the issues” forcing Encrochat to shutdown.

2 Likes

I mean, is this really news? Do you expect random companies within e.g., France, the US to actively work against LE when there’s a legal obligation?

The only way you can prevent LE from gaining access to things via court orders or laws is to design stuff in such a way that you can’t help them even if you want to – e.g., Apple’s hardware security preventing them from ever getting the user data off a phone if it hasn’t been synced to iCloud, Graphene’s update infrastructure requiring keys not spread widely and it not being possible to send out targeted updates, Yubikeys not having any firmware updates at all to prevent any kind of malicious update or downgrade etc.

So really, this just reinforces the fact that if your threat model involves running from the law, you basically cannot trust anything or anyone unless it is a physical/mathematical/whatever impossibility for that person or thing to assist the cops in any way

5 Likes

Or that’s why you use a .onion site, which many forgot it’s not just a cool thing, it also serve as a protection to a website.